Sciweavers

1419 search results - page 282 / 284
» Order Retrieval
Sort
View
126
Voted
P2P
2010
IEEE
132views Communications» more  P2P 2010»
15 years 7 days ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
PAMI
2010
147views more  PAMI 2010»
15 years 7 days ago
The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning
—Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending...
Aaron D. Ward, Ghassan Hamarneh
SISAP
2010
IEEE
135views Data Mining» more  SISAP 2010»
15 years 6 days ago
Improving the similarity search of tandem mass spectra using metric access methods
In biological applications, the tandem mass spectrometry is a widely used method for determining protein and peptide sequences from an ”in vitro” sample. The sequences are not...
Jiri Novák, Tomás Skopal, David Hoks...
132
Voted
ASIACRYPT
2010
Springer
14 years 12 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
124
Voted
CLEF
2009
Springer
14 years 11 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...